Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 23:19
Behavioral task
behavioral1
Sample
calc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
calc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20240802-en
General
-
Target
calc.exe
-
Size
201KB
-
MD5
2f9fdad776d8626f2ce8625211831e91
-
SHA1
21d8413eb0d60b36fc249f8025c277b557fefde3
-
SHA256
9b66a8ea0f1c64965b06e7a45afbe56f2d4e6d5ef65f32446defccbebe730813
-
SHA512
2abd61c6bea7c748f81cdd18133582217bd06dd19506f13f89953f8c7bd662fc5233540b9f56c57aa94e038c674128fc46dd280e2f7db642343fc5a45da25feb
-
SSDEEP
6144:96LkVO8A1X2og0tEHH45Y0KTIVaTycTVDNe4oI:TMJ1X2og0MHGKT3RRwG
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation calc.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wscript.exe -
resource yara_rule behavioral2/memory/2804-0-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2804-4-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4768-6-0x0000000000400000-0x000000000048B000-memory.dmp upx -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1044 2804 calc.exe 83 PID 2804 wrote to memory of 1044 2804 calc.exe 83 PID 2804 wrote to memory of 1044 2804 calc.exe 83 PID 1044 wrote to memory of 2904 1044 wscript.exe 84 PID 1044 wrote to memory of 2904 1044 wscript.exe 84 PID 1044 wrote to memory of 2904 1044 wscript.exe 84 PID 1044 wrote to memory of 2128 1044 wscript.exe 86 PID 1044 wrote to memory of 2128 1044 wscript.exe 86 PID 1044 wrote to memory of 2128 1044 wscript.exe 86 PID 1044 wrote to memory of 4768 1044 wscript.exe 88 PID 1044 wrote to memory of 4768 1044 wscript.exe 88 PID 1044 wrote to memory of 4768 1044 wscript.exe 88 PID 2904 wrote to memory of 2296 2904 net.exe 89 PID 2904 wrote to memory of 2296 2904 net.exe 89 PID 2904 wrote to memory of 2296 2904 net.exe 89 PID 2128 wrote to memory of 2560 2128 net.exe 90 PID 2128 wrote to memory of 2560 2128 net.exe 90 PID 2128 wrote to memory of 2560 2128 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" 3MknSo1yGp.jse2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user LocalAdministrator /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user LocalAdministrator /add4⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" localgroup administrators LocalAdministrator /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators LocalAdministrator /add4⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905B
MD5b4eb7f28555dda63f591a950f2db89d1
SHA192ba2174422096a09ce506c041165564360accc3
SHA25600c9f54dc4deec12db8ba086ec347d03f978e46222d9c5ec5c6240f7ac171c5c
SHA5123268de3032832a54e3251589b6d41ff43f3181e7fbc5de6d466ea45c6db0c8bba6704f87954b4e28a9273067ebe20066169ff70f896a236a3f786291fb660d24